Browsing Institutt for informasjonssikkerhet og kommunikasjonsteknologi by Title
Now showing items 2505-2524 of 2525
-
Windows 10 Memory Compression in Digital Forensics - Uncovering Digital Evidence in Compressed Swap
(Master thesis, 2018)Digital investigators and incident responders often rely on evidence residing in computer memory and page files on hard drives. Artifacts such as browsing history, image thumbnails and shell commands can answer important ... -
Windows Security Baselines
(Bachelor thesis, 2022)I cyber-sikkerhet i dag er ondsinnede aktører og angrepsmetodene de bruker under konstant utvikling for å finne nye og kreative måter på å tilegne seg uautorisert tilgang til IT systemer. Ettersom disse trusslene utvikler ... -
Windows Server 2019/2022 and Azure Cloud security systems - A general recommendation
(Bachelor thesis, 2022)Organisasjoner i dag har mange cybertrusler som de bør være oppmerksomme på og som de bør aktivt beskyttes imot. Det er mange sikkerhetsfunksjoner som er viktige å bruke for å aktivt beskytte seg imot disse sikkerhetstru ... -
WireGuard for Securing Constrained Application Protocol for IoT Devices (CoAP)
(Master thesis, 2021)With the ever-rising popularity of Internet of Things (IoT) devices, the issue of securing communication between the constrained nodes in the IoT network while still achieving adequate speed and performance is as significant ... -
Wireless LAN auditing procedure for industrial environments
(Master thesis, 2017)Today's industry is dependent on computer networks. These computer networks are a vital part of how industrial environments operate. They are used for a variety of different tasks. Networks are needed to do everything from ... -
Wireless powered cognitive radio networks with multiple antenna sources and hardware impairments
(Peer reviewed; Journal article, 2022)In this paper, a radio-frequency (RF) energy harvesting enabled cognitive radio network (CRN) is considered in the presence of transceiver hardware impairments (HIs). Herein, one of the secondary nodes (SNs) exploits ... -
Wireless Sensor Networks, energy efficiency and path recovery
(Doctoral theses at NTNU;2017:135, Doctoral thesis, 2017)Wireless Sensor Networks (WSN) consists of sensor nodes equipped with radios for wireless communication. The overall goal of the sensor networks is to gather data. The terminal point for the data is usually a specific ... -
Wireless USRP Test-bed for DSRC Applications
(Master thesis, 2016)Dedicated Short-Range Communications (DSRC) is a wireless communication technology used in Intelligent Transport Systems for road vehicles. Applications utilizing DSRC are becoming more and more widespread, and include ... -
With a Little Help from Your Friends: Collaboration with Vendors During Smart Grid Incident Response Exercises
(Chapter, 2021)The introduction of Information and Communications Technology (ICT) into conventional power grids has resulted in a digitalized smart grid, enabling a more efficient and robust operation. However, it can also lead to ... -
Workshops for brukermedvirkning i utvikling av konsepter for fremtidige IKT-baserte systemer i helsesektoren: Brukersentrert utvikling
(Master thesis, 2007)Helsesektoren er et av områdene der det satses sterkest på innføring av informasjons- og kommunikasjonsteknologi. For å få en optimal utnyttelse av de store gevinstene tilknyttet IKT er det av stor betydning at de nye ... -
Worm Detection Using Honeypots
(Master thesis, 2006)This thesis describes a project that utilizes honeypots to detect worms. A detailed description of existing worm detection techniques using honeypots is given, as well as a study of existing worm propagation models. ... -
WPAxFuzz: Sniffing Out Vulnerabilities in Wi-Fi Implementations
(Peer reviewed; Journal article, 2022)This work attempts to provide a way of scrutinizing the security robustness of Wi-Fi implementations in an automated fashion. To this end, to our knowledge, we contribute the first full-featured and extensible Wi-Fi fuzzer. ... -
WPAxFuzz: Sniffing Out Vulnerabilities in Wi-Fi Implementations †
(Peer reviewed; Journal article, 2022)This work attempts to provide a way of scrutinizing the security robustness of Wi-Fi implementations in an automated fashion. To this end, to our knowledge, we contribute the first full-featured and extensible Wi-Fi fuzzer. ... -
WYK: Mobile Device Authentication Using the User’s Address Book
(Chapter, 2022)Authenticating a user the correct way is paramount to IT systems, where the risk is growing more and more in number and complexity. This is specially important in mobile phones, where a number of applications require ... -
Young Children and the Use of Video Chat: - Exploring User Behaviour and the Influence of Technical Factors
(Master thesis, 2018)The use of video chat applications is increasing, both in private and professional settings. There has been much focus in the literature on, for example, how and in what contexts applications for video chats are used, and ... -
Young children and the use of video chat:implications for QoE research
(Chapter, 2019) -
ZCAM, a colour appearance model based on a high dynamic range uniform colour space
(Journal article; Peer reviewed, 2021) -
Zero effort security for the home PC users?
(Master thesis, 2008)NORSK: I dagens teknologiske samfunn, hvor datamaskiner i voksende grad blir brukt til å aksessere all slags informasjon over Internett, er det viktig å beskytte disse maskinene fra farene på Internett. Enten det er ... -
Å tagge eller ikke tagge: Kan studenter i høyere utdanning bidra til læringsobjekter av økt gjenbruksverdi og kvalitet?
(Journal article; Peer reviewed, 2012)Læringsobjekter er en relativt ny term i norsk utdanning, og defineres her som «interaktive webbaserte ressurser som støtter læring av spesifikke konsepter ved å framheve, forsterke og støtte den lærendes kognitive læring». ... -
Åpen Kanal: Ytringsrett og distribuert samhandling
(Master thesis, 2006)Foreningen Åpen kanal er Norges første og eneste initiativtaker til å sikre allmennheten en ytringsrett i fjernsynet. Ytringsrett er en reell ytringsfrihet der man blir gitt tilgang til en kanal for fri ytring. For at ...